tcp_send.c 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. /*
  2. * Copyright (c) 2006, 2017 Oracle and/or its affiliates. All rights reserved.
  3. *
  4. * This software is available to you under a choice of one of two
  5. * licenses. You may choose to be licensed under the terms of the GNU
  6. * General Public License (GPL) Version 2, available from the file
  7. * COPYING in the main directory of this source tree, or the
  8. * OpenIB.org BSD license below:
  9. *
  10. * Redistribution and use in source and binary forms, with or
  11. * without modification, are permitted provided that the following
  12. * conditions are met:
  13. *
  14. * - Redistributions of source code must retain the above
  15. * copyright notice, this list of conditions and the following
  16. * disclaimer.
  17. *
  18. * - Redistributions in binary form must reproduce the above
  19. * copyright notice, this list of conditions and the following
  20. * disclaimer in the documentation and/or other materials
  21. * provided with the distribution.
  22. *
  23. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  24. * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  25. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  26. * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
  27. * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
  28. * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
  29. * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  30. * SOFTWARE.
  31. *
  32. */
  33. #include <linux/kernel.h>
  34. #include <linux/in.h>
  35. #include <net/tcp.h>
  36. #include "rds_single_path.h"
  37. #include "rds.h"
  38. #include "tcp.h"
  39. static void rds_tcp_cork(struct socket *sock, int val)
  40. {
  41. kernel_setsockopt(sock, SOL_TCP, TCP_CORK, (void *)&val, sizeof(val));
  42. }
  43. void rds_tcp_xmit_path_prepare(struct rds_conn_path *cp)
  44. {
  45. struct rds_tcp_connection *tc = cp->cp_transport_data;
  46. rds_tcp_cork(tc->t_sock, 1);
  47. }
  48. void rds_tcp_xmit_path_complete(struct rds_conn_path *cp)
  49. {
  50. struct rds_tcp_connection *tc = cp->cp_transport_data;
  51. rds_tcp_cork(tc->t_sock, 0);
  52. }
  53. /* the core send_sem serializes this with other xmit and shutdown */
  54. static int rds_tcp_sendmsg(struct socket *sock, void *data, unsigned int len)
  55. {
  56. struct kvec vec = {
  57. .iov_base = data,
  58. .iov_len = len,
  59. };
  60. struct msghdr msg = {
  61. .msg_flags = MSG_DONTWAIT | MSG_NOSIGNAL,
  62. };
  63. return kernel_sendmsg(sock, &msg, &vec, 1, vec.iov_len);
  64. }
  65. /* the core send_sem serializes this with other xmit and shutdown */
  66. int rds_tcp_xmit(struct rds_connection *conn, struct rds_message *rm,
  67. unsigned int hdr_off, unsigned int sg, unsigned int off)
  68. {
  69. struct rds_conn_path *cp = rm->m_inc.i_conn_path;
  70. struct rds_tcp_connection *tc = cp->cp_transport_data;
  71. int done = 0;
  72. int ret = 0;
  73. int more;
  74. if (hdr_off == 0) {
  75. /*
  76. * m_ack_seq is set to the sequence number of the last byte of
  77. * header and data. see rds_tcp_is_acked().
  78. */
  79. tc->t_last_sent_nxt = rds_tcp_write_seq(tc);
  80. rm->m_ack_seq = tc->t_last_sent_nxt +
  81. sizeof(struct rds_header) +
  82. be32_to_cpu(rm->m_inc.i_hdr.h_len) - 1;
  83. smp_mb__before_atomic();
  84. set_bit(RDS_MSG_HAS_ACK_SEQ, &rm->m_flags);
  85. tc->t_last_expected_una = rm->m_ack_seq + 1;
  86. if (test_bit(RDS_MSG_RETRANSMITTED, &rm->m_flags))
  87. rm->m_inc.i_hdr.h_flags |= RDS_FLAG_RETRANSMITTED;
  88. rdsdebug("rm %p tcp nxt %u ack_seq %llu\n",
  89. rm, rds_tcp_write_seq(tc),
  90. (unsigned long long)rm->m_ack_seq);
  91. }
  92. if (hdr_off < sizeof(struct rds_header)) {
  93. /* see rds_tcp_write_space() */
  94. set_bit(SOCK_NOSPACE, &tc->t_sock->sk->sk_socket->flags);
  95. ret = rds_tcp_sendmsg(tc->t_sock,
  96. (void *)&rm->m_inc.i_hdr + hdr_off,
  97. sizeof(rm->m_inc.i_hdr) - hdr_off);
  98. if (ret < 0)
  99. goto out;
  100. done += ret;
  101. if (hdr_off + done != sizeof(struct rds_header))
  102. goto out;
  103. }
  104. more = rm->data.op_nents > 1 ? (MSG_MORE | MSG_SENDPAGE_NOTLAST) : 0;
  105. while (sg < rm->data.op_nents) {
  106. int flags = MSG_DONTWAIT | MSG_NOSIGNAL | more;
  107. ret = tc->t_sock->ops->sendpage(tc->t_sock,
  108. sg_page(&rm->data.op_sg[sg]),
  109. rm->data.op_sg[sg].offset + off,
  110. rm->data.op_sg[sg].length - off,
  111. flags);
  112. rdsdebug("tcp sendpage %p:%u:%u ret %d\n", (void *)sg_page(&rm->data.op_sg[sg]),
  113. rm->data.op_sg[sg].offset + off, rm->data.op_sg[sg].length - off,
  114. ret);
  115. if (ret <= 0)
  116. break;
  117. off += ret;
  118. done += ret;
  119. if (off == rm->data.op_sg[sg].length) {
  120. off = 0;
  121. sg++;
  122. }
  123. if (sg == rm->data.op_nents - 1)
  124. more = 0;
  125. }
  126. out:
  127. if (ret <= 0) {
  128. /* write_space will hit after EAGAIN, all else fatal */
  129. if (ret == -EAGAIN) {
  130. rds_tcp_stats_inc(s_tcp_sndbuf_full);
  131. ret = 0;
  132. } else {
  133. /* No need to disconnect/reconnect if path_drop
  134. * has already been triggered, because, e.g., of
  135. * an incoming RST.
  136. */
  137. if (rds_conn_path_up(cp)) {
  138. pr_warn("RDS/tcp: send to %pI6c on cp [%d]"
  139. "returned %d, "
  140. "disconnecting and reconnecting\n",
  141. &conn->c_faddr, cp->cp_index, ret);
  142. rds_conn_path_drop(cp, false);
  143. }
  144. }
  145. }
  146. if (done == 0)
  147. done = ret;
  148. return done;
  149. }
  150. /*
  151. * rm->m_ack_seq is set to the tcp sequence number that corresponds to the
  152. * last byte of the message, including the header. This means that the
  153. * entire message has been received if rm->m_ack_seq is "before" the next
  154. * unacked byte of the TCP sequence space. We have to do very careful
  155. * wrapping 32bit comparisons here.
  156. */
  157. static int rds_tcp_is_acked(struct rds_message *rm, uint64_t ack)
  158. {
  159. if (!test_bit(RDS_MSG_HAS_ACK_SEQ, &rm->m_flags))
  160. return 0;
  161. return (__s32)((u32)rm->m_ack_seq - (u32)ack) < 0;
  162. }
  163. void rds_tcp_write_space(struct sock *sk)
  164. {
  165. void (*write_space)(struct sock *sk);
  166. struct rds_conn_path *cp;
  167. struct rds_tcp_connection *tc;
  168. read_lock_bh(&sk->sk_callback_lock);
  169. cp = sk->sk_user_data;
  170. if (!cp) {
  171. write_space = sk->sk_write_space;
  172. goto out;
  173. }
  174. tc = cp->cp_transport_data;
  175. rdsdebug("write_space for tc %p\n", tc);
  176. write_space = tc->t_orig_write_space;
  177. rds_tcp_stats_inc(s_tcp_write_space_calls);
  178. rdsdebug("tcp una %u\n", rds_tcp_snd_una(tc));
  179. tc->t_last_seen_una = rds_tcp_snd_una(tc);
  180. rds_send_path_drop_acked(cp, rds_tcp_snd_una(tc), rds_tcp_is_acked);
  181. rcu_read_lock();
  182. if ((refcount_read(&sk->sk_wmem_alloc) << 1) <= sk->sk_sndbuf &&
  183. !rds_destroy_pending(cp->cp_conn))
  184. queue_delayed_work(rds_wq, &cp->cp_send_w, 0);
  185. rcu_read_unlock();
  186. out:
  187. read_unlock_bh(&sk->sk_callback_lock);
  188. /*
  189. * write_space is only called when data leaves tcp's send queue if
  190. * SOCK_NOSPACE is set. We set SOCK_NOSPACE every time we put
  191. * data in tcp's send queue because we use write_space to parse the
  192. * sequence numbers and notice that rds messages have been fully
  193. * received.
  194. *
  195. * tcp's write_space clears SOCK_NOSPACE if the send queue has more
  196. * than a certain amount of space. So we need to set it again *after*
  197. * we call tcp's write_space or else we might only get called on the
  198. * first of a series of incoming tcp acks.
  199. */
  200. write_space(sk);
  201. if (sk->sk_socket)
  202. set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
  203. }